Spontaneous recognition: Risk or distraction

Slides:



Advertisements
Similar presentations
Exploring communication about genetic risk: British Pakistani families Alison Shaw, Department of Public Health, University of Oxford Negotiating risk:
Advertisements

Statistical Disclosure Control (SDC) at SURS Andreja Smukavec General Methodology and Standards Sector.
Chapter 18 Torts.
Sociology as a Science. Natural Sciences  Biology and Chemistry are probably the first subjects which spring to mind when considering “what is science”
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Organizational Change.
Operationalising ‘safe statistics’ the case of linear regression Felix Ritchie Bristol Business School, University of the West of England, Bristol.
Developing a Statistical Disclosure Standard for Europe Tanvi Desai LSE Research Laboratory Data Manager Research Laboratory IASSIST 2010: Cornell.
Management, 6e Schermerhorn Prepared by Cheryl Wyrick California State Polytechnic University Pomona John Wiley & Sons, Inc.
Aspects of Bayesian Inference and Statistical Disclosure Control in Python Duncan Smith Confidentiality and Privacy Group CCSR University of Manchester.
Session 4. Panel session: How useful is the notion of “circle of trust” concept ? A vision for the future. Maurice Brandt Destatis Germany 2ND EUROPEAN.
Copyright © 2008 by Robert B. Carton Selected Business Law Topics.
The Application of the Concept of Uniqueness for Creating Public Use Microdata Files Jay J. Kim, U.S. National Center for Health Statistics Dong M. Jeong,
Four Wheel Drive Australia Risk Management Presentation.
Accreditation practices at the Hungarian Central Statistical Office Zoltán Vereczkei Methodology Department Hungarian Central Statistical Office
User-focused Threat Identification For Anonymised Microdata Hans-Peter Hafner HTW Saar – Saarland University of Applied Sciences
Disclosure detection & control in research environments Felix Ritchie.
Access to sensitive data in the UK: a principles-based approach Felix Ritchie.
User-centred, evidence-based, risk- managed access to data Hans-Peter Hafner 1, Rainer Lenz 1,2, Felix Ritchie 3, Richard Welpton 4 1 Technical University.
Creating Open Data whilst maintaining confidentiality Philip Lowthian, Caroline Tudor Office for National Statistics 1.
Development of UK Virtual Microdata Laboratory Felix Ritchie Shanghai, March 2010.
Business data linking recent UK experience. business data in the UK common register (IDBR) since 1994 key law: Statistics of Trade Act 1947 data collection.
RISK MANAGEMENT FOR COMMUNITY EVENTS. Today’s Session Risk Management – why is it important? Risk Management and Risk Assessment concepts Steps in the.
The health and safety at work Act - a new way of thinking
Mirjana Boshnjak Skopje, 20 to 22 September 2017
Statistics 200 Lecture #9 Tuesday, September 20, 2016
Welcome Reference Checking Reducing the Risk Reference Checking
Risk Assessments.
Strategies to Improve Health Equity
Development of UK Virtual Microdata Laboratory
Intentional Leadership
The user as data detective
Part 2 The Volunteer Code of Ethics
Access to business data: Is the balance of risks right?
THE CONCEPTUAL FRAMEWORK
3.2 -Violence in sport What types of violence are there?
Anonymisation: Theory and Practice
Public perceptions of the Channel Ecosystem
The resources academics recommend – and what students are really using
Sabrina Iavarone Senior User Services Officer
Understanding Risk and Protective Factors: Their Use in Selecting Potential Targets and Promising Strategies for Interventions.
Chapter 27 Security Engineering
Open data: who needs it? Presentation by Felix Ritchie
Treatment of statistical confidentiality Part 1: Principles Introductory course Trainer: Felix Ritchie CONTRACTOR IS ACTING UNDER A FRAMEWORK CONTRACT.
INDIVIDUAL INTERVENTIONS
Negligence.
Detecting, reporting & investigating data breaches under GDPR
Scientific Method Steps
Intentional Leadership
Information Security Casebook
Disclosure Avoidance: An Overview
Ignoring? Nurturing Parenting Section 13.2 GOAL
Safety Self-Inspections
Lessons learned in training ‘safe users’ of confidential data
Chapter 11 Decision Making I: Need Recognition and Search
Item 2.2 of the Agenda Remote access to confidential data for researchers: possible actions under the 7th Framework Programme Pascal JACQUES Unit B 5 15.
Access to business data: Is the balance of risks right?
Giving developmental feedback
The Halton District School Board expects that everyone associated with the Board has a right to be treated with respect and dignity and to teach, learn.
Europe 2020 objectives Employment, Education, Social Inclusion, Innovation Smart growth - research/innovation creating new products/services that generate.
Unit 2 – Methods Objective 1 Describe quantitative and qualitative  methods such as surveys, polls, and statistics used in sociological research.  Objective.
Educational Psychology: Developing Learners
Access to confidential data: Is the balance of risks right?
Treatment of statistical confidentiality Part 3: Generalised Output SDC Introductory course Trainer: Felix Ritchie CONTRACTOR IS ACTING UNDER A FRAMEWORK.
Dealing with confidential data Introductory course Trainer: Felix Ritchie CONTRACTOR IS ACTING UNDER A FRAMEWORK CONTRACT CONCLUDED WITH THE COMMISSION.
Treatment of statistical confidentiality Introductory course Trainer: Felix Ritchie CONTRACTOR IS ACTING UNDER A FRAMEWORK CONTRACT CONCLUDED WITH THE.
Access to European microdata for scientific purposes
STRUCTURE OF THE CHAPTER
Anna Adams Martina Angela Sasse
Item 2.2 Scientific Use Files for the Time Use Survey
Teaching Behaviour To All Children To Prevent Problems Occurring
Presentation transcript:

Spontaneous recognition: Risk or distraction Presentation by Felix Ritchie Bristol Business School Budapest 20.10.16

Spontaneous recognition (SR) recognising respondents in microdata examples: street, gender, age university department, gender, job title University of Tasmania Thurso power station need not be correct can lead to perceptions of insecurity important confidentiality risk Scientific Use Files (SUFs) and Secure Use Files (SecUFs) much effort expended on eliminating SR

SR: meaningless concept? you can’t prove it doesn’t exist you can’t prove that it has occurred [unless IC occurs: see below…] it’s lawful it ignores human nature statistical protection excessive

Better: identity confirmation (IC) actively taking steps to confirm suspicions of identity Examples: cross-checking with other variables checking other data sources speculating on the identity of respondents with others

Why is IC better? Focuses on the unlawful activity Easier to detect Fewer assumptions needed about ability to breach confidentiality Management interventions well suited to this can be covered in contracts/training no need to damage data unnecessarily Exploits knowledge of actual human behaviour Reinforces trust models Emphasis is on engagement in research community Greater researcher buy-in = lower risk Researchers encouraged to report SR, not punished

Does this matter? An example Community Innovation Survey: European business survey on R&D and innovation activities Old method: Assumes intruder, external dataset for matching, SR 100% of all continuous variables microaggregated New method: Assumes idiot, potential for IC additional guidelines for researchers issued 1% of one continuous var microaggregated

So why do data owners focus on SR? almost all NSI decision-making is defensive Defensive: “I won’t do this unless I’m certain it’s safe” Faciliating: “I will do this unless I can’t do it safely” uses hypothetical worst cases rather than empirical evidence not possible to disprove requires those wanting to release data to prove safety no requirement for NSI to produce evidence statistical disclosure control literature entirely defensive

No-one gets fired for this… “I’m not convinced yet that all the confidentiality risks have been minimised” …which they should be

Dealing with SR Identify the likelihood of genuine SR Deal with the trivial blindingly obvious recognition no research value in the troublesome variables Focus on the likelihood of IC Use real evidence, not hypothetical modelling Consider management interventions as well as statistical solutions Keep data damage as the residual Ideally do all this from a facilitating perspective